The Shifting Cybersecurity Landscape

Size: px
Start display at page:

Download "The Shifting Cybersecurity Landscape"

Transcription

1 Enterprise Strategy Group Getting to the bigger truth. Research Report The Shifting Cybersecurity Landscape Rise of Enterprise-class Vendors By Jon Oltsik, ESG Senior Principal Analyst; Doug Cahill, Senior Analyst; and Bill Lundell, Director of Syndicated Research April 2017

2 Research Report: The Shifting Cybersecurity Landscape 2 Contents List of Figures... 3 Executive Summary... 4 Report Conclusions... 4 Introduction... 5 Research Objectives... 5 Research Findings... 6 Best of Breed Is the Norm, but Architectural Integration Is an Important Product Requirement... 6 Cybersecurity Vendor Consolidation Is Happening... 8 Vendor Consolidation Increases the Influence of the CISO The Concept of Cybersecurity Platforms Resonates, but Needs Further Refinement Enterprise-class Cybersecurity Vendors Are Emerging SIEM Is Important for Enterprise-class Security Consideration Cisco, IBM, and Microsoft Are Most Commonly Perceived as Enterprise-class Security Vendors Conclusion Research Implications for Cybersecurity Vendors Research Implications for Cybersecurity Professionals Research Methodology Respondent Demographics Respondents by Current Responsibility Respondents by Number of Employees Respondents by Industry Respondents by Annual Revenue... 24

3 List of Figures Research Report: The Shifting Cybersecurity Landscape 3 Figure 1. Cybersecurity Product Considerations and Strategies... 7 Figure 2. Best-of-breed Product Outlook... 7 Figure 3. Cybersecurity Vendor Consolidation Sentiment... 8 Figure 4. Changes in Cybersecurity Vendor Management Over the Last 12 Months... 9 Figure 5. Impact of Cybersecurity Vendor Consolidation on Role of CISO Figure 6. Cybersecurity Platform Sentiment Figure 7. Most Important Attribute of a Cybersecurity Platform Figure 8. Value of Procuring Cybersecurity Solutions from Fewer Enterprise-class Vendors Figure 9. Most Important Attributes for Enterprise-class Cybersecurity Vendor Figure 10. Importance of SIEM as Part of Enterprise-class Security Architecture/Platform Figure 11. Importance of Enterprise-class Cybersecurity Vendor Offering SIEM Product Figure 12. SIEM Capabilities Considered Most Important to Enterprise-class Cybersecurity Portfolio Figure 13. Respondents Rate Cybersecurity Vendors Figure 14. Respondents by Role Figure 15. Respondents by Number of Employees Worldwide Figure 16. Respondents by Industry Figure 17. Respondents by Annual Revenue... 24

4 Research Report: The Shifting Cybersecurity Landscape 4 Executive Summary Report Conclusions ESG conducted an in-depth survey of 176 IT and cybersecurity professionals responsible for evaluating, purchasing, and managing security technologies for their organizations. Survey participants represented large midmarket (500 to 999 employees) and enterprise-class (1,000 employees or more) organizations in North America (United States and Canada). Based on the data collected from this survey, ESG concludes that: Best of breed is the norm, but integration and architectural compatibility are important product requirements. Organizations favor cybersecurity products that align with their broader integration strategies based on an architectural approach to alleviate the complexity associated with siloed processes and solutions. While best-ofbreed product selection criteria remains intact, product selection is now highly influenced by integration capabilities. Cybersecurity vendor consolidation is happening. Driven by users prioritization for integrated products, the industry continues to move toward vendor consolidation. Organizations prefer to first and foremost purchase security products from vendors that they already work with as opposed to using a new vendor for procurement, support, and operational efficiencies. Vendor consolidation increases the influence of the CISO. The stated intent of enterprise organizations to consolidate the number of vendors from whom they procure cybersecurity solutions will result in CISOs being more involved in strategic briefings with vendors. In these discussions with vendors, CISOs will look to vet the alignment of the current capabilities and product roadmap of a given vendor with their own cybersecurity initiatives and technology adoption plans. The concept of cybersecurity platforms resonates, but needs further refinement. IT professionals are aware that vendors are increasingly eager to offer platforms, but there are some gaps in communication and messaging between vendors and customers. The majority of respondents have only a vague idea of what their vendors are offering in regard to a platform and what they are planning with respect to their roadmap. The onus is on vendors to clearly communicate their plans and the benefits of their platforms to gain customers buy-in. Enterprise-class cybersecurity vendors are emerging. Enterprise-class cybersecurity vendors are those vendors positioned to offer a broad array of increasingly integrated products and services to large organizations. Or put another way, they are vendors that can serve as a primary source for a wide variety of cybersecurity products and services. Pairing this with the theme of cybersecurity vendor consolidation provides a clear picture of the future: Organizations will work with fewer vendors over time, with preference given to those that meet criteria that characterizes them as enterprise-class, or those remaining point-tools vendors that latch onto enterprise cybersecurity vendor ecosystems. SIEM is key for enterprise-class security consideration. Organizations continue to rely heavily on SIEMs as the hub of their security operations. Indeed, nearly half of respondents report that SIEM is very important as part of an enterprise-class security architecture or platform. IT professionals have high standards and broad requirements for their SIEMs, and for prospective enterprise-class security vendors, so offering a feature-rich SIEM will remain paramount. Cisco, IBM, and Microsoft are most commonly perceived as enterprise-class security vendors. The cybersecurity landscape is packed with vendors, but very few have the portfolio breadth to be considered truly enterprise-class. Among that small group, IT professionals currently view Cisco, IBM, and Microsoft as the leaders. It is noteworthy that Microsoft and Amazon, two vendors only peripherally involved in the cybersecurity technology market, both garnered significant mindshare as enterprise-class security providers. ESG attributes this to the strategic relationships both these organizations have in IT infrastructure.

5 Introduction Research Report: The Shifting Cybersecurity Landscape 5 The cybersecurity industry is populated with a plethora of vendors offering discrete solutions representing a fragmented market, historically absent of dominant leaders. The influx of venture capital funding, and, more recently, the participation of private equity firms, have contributed to a growing number of players vying for buyer mindshare and budget. However, notable M&A activity, including Symantec s acquisition of BlueCoat, and the TPG Capital-led spinout of Intel Security, coupled with anecdotal customer feedback about point tool fatigue, indicate the cybersecurity market is at a tipping point, one that could lead to centers of power, vendor-centric ecosystems, and the emergence of a small group of enterpriseclass cybersecurity vendors. These dynamics were the impetus for ESG to conduct research on both the rise of enterpriseclass cybersecurity vendors and the requirements of enterprise-ready cybersecurity platforms. Research Objectives In order to further investigate and assess these trends, ESG surveyed 176 IT and cybersecurity professionals representing large midmarket (i.e., 500 to 999 employees) and enterprise (i.e., 1,000 or more employees) organizations in North America, though it is worth noting that more than 90% of respondents are employed at organizations with at least 1,000 employees. The survey was designed to provide insight into the following questions: How are IT decision makers approaching cybersecurity product purchasing decisions when it comes to best of breed, integrations, and single sourcing? What do IT and security professionals view as the most important characteristics of an enterprise-class cybersecurity vendor? Which vendors are perceived to be enterprise-class cybersecurity vendors? What changes have organizations undergone in regards to their cybersecurity processes and product selection decisions? Are vendors succeeding in messaging their platforms to customers and prospects? Are organizations opting for cybersecurity vendor consolidation initiatives? How do IT decision makers view enterprise-class cybersecurity vendors? What defines them? Who are the leaders? How will vendor consolidation affect the CISO s influence in product purchasing decisions? How have integration requirements altered the evaluation, the purchase, and the deployment process for cybersecurity technologies? How do organizations view SIEM technology? How important is SIEM technology to their overall strategy and operations? Survey participants represented a wide range of industries including financial services, manufacturing, health care, and retail. For more details, please see the Research Methodology and Respondent Demographics sections of this report.

6 Research Report: The Shifting Cybersecurity Landscape 6 Research Findings Best of Breed Is the Norm, but Architectural Integration Is an Important Product Requirement Organizations increasingly need to do more with less when it comes to cybersecurity. The well-documented cybersecurity skills shortage that ESG has tracked for the last several years continues to impact organizations in that most cannot hire their way to better security; they must instead make the most of the technology and staff at their disposal. In practical terms, this means that integrating various cybersecurity products and technologies is now a central factor in purchasing decisions. A nuanced look at the data bears this point out. For example, Figure 1 shows that 73% of respondents strongly agree or agree that their organization tends to select best-of-breed security products. This is consistent with historical infosec behavior where each product was evaluated and purchased based upon its overall security efficacy compared with other competitive technologies. However, 81% of those same respondents also strongly agree or agree that a cybersecurity product s ability to integrate with others (i.e., by way of standards adherence, open APIs, integration support, etc.) has become an important consideration for the procurement of cybersecurity solutions, with 82% noting they are actively building an architecture to support such integrations. Similarly, 78% of respondents strongly agree or agree that security products are regularly qualified on their integration capabilities. This supports the notion that best-of-breed must include technology integration support. Yet the requirement for integration does not negate the interest in a primary supplier of cybersecurity products and services as evidenced by 80% of participants noting they would buy a majority of cybersecurity products from an enterprise-class vendor. Taken in sum, the data paints a picture: Organizations still want best-of-breed products, but favor those offering superior potential integration capabilities. This represents a possible break from the past when cybersecurity professionals often followed a best-of-breed strategy for every individual cybersecurity technology deployed on hosts and networks. While this general philosophy still remains intact today, the data suggests that because each product is now also evaluated and selected based upon its integration capabilities, the equation is no longer tilted purely in favor of technical superiority. In fact, a convincing 74% of survey respondents report that their organization selects best-of-breed only if the product is designed for broader technology integration (see Figure 2). This attitude was further summed up in a recent discussion with an enterprise CISO. When asked about product integration, he stated, Product integration is the new best-of-breed.

7 Research Report: The Shifting Cybersecurity Landscape 7 Figure 1. Cybersecurity Product Considerations and Strategies Please indicate whether you agree or disagree with each of the following statements. (Percent of respondents, N=176) Strongly agree Agree Neither agree nor disagree Disagree Strongly Disagree A cybersecurity product s ability to integrate with others has become an important consideration of our security product procurement criteria 32% 49% 15% 4% My organization is actively building a security architecture that integrates multiple individual products 27% 55% 16% 2% 1% My organization tends to select best-of-breed security products 27% 46% 23% 3% 1% The security products my organization buys are regularly qualified on their integration capabilities 24% 54% 20% 2% If my organization could identify an enterprise-class cybersecurity vendor, we would be willing to buy a majority of our security products from this type of vendor 20% 60% 17% 3% 0% 20% 40% 60% 80% 100% Figure 2. Best-of-breed Product Outlook Which of the following statements about best-of-breed products most closely aligns with your organization s outlook? (Percent of respondents, N=129) My organization tends to select best-of-breed security products regardless of the vendor or the product s ability to integrate with other security technologies, 26% My organization tends to select best-of-breed products but only if they are designed for broader technology integration, 74%

8 Research Report: The Shifting Cybersecurity Landscape 8 Cybersecurity Vendor Consolidation Is Happening While organizations prioritize best-of-breed security products built for integration, they are also winnowing down the total number of vendors from whom they purchase security products and services. In fact, nearly one-quarter of organizations are actively consolidating the cybersecurity vendors they conduct business with while another 38% are consolidating security vendors on a limited basis today (see Figure 3). It is worth noting that organizations of all sizes are consolidating cybersecurity vendors. This points to a general trend where CISOs will likely continue to reduce the number of security vendors they work with in the future. This data seems to indicate that there will be winners and losers in the cybersecurity industry in the near future. These trends the importance of integration capabilities, growing vendor consolidation, and increasing CISO involvement indicate that organizations are likely to change the way they qualify and perform due diligence on the cybersecurity vendors they ultimately choose. Indeed, the data shows organizations have become more rigorous in their testing and more demanding in their expectations from vendors (see Figure 4). Twenty-four percent of respondents indicate that over the last 12 months they have begun performing due diligence to examine the cloud hosting environment of their security-as-a-service providers, while an equal 24% report that they have begun requiring regular roadmap reviews from their most strategic vendors. While these activities were not unheard of in the past, their practices appear to be more commonplace and rigorous than in the past. Cybersecurity vendors will have to adopt best practices for secure development, supply chain management, staff training, and field support in order to achieve enterprise-class status. Figure 3. Cybersecurity Vendor Consolidation Sentiment Which of the following statements regarding the consolidation of cybersecurity vendors with whom your organization conducts business is most accurate? (Percent of respondents, N=176) We have no plans to consolidate the cybersecurity vendors with whom we conduct business, 15% Don t know, 2% We are actively consolidating the cybersecurity vendors with whom we conduct business, 24% We are considering consolidating the cybersecurity vendors with whom we conduct business, 21% We are consolidating the cybersecurity vendors with whom we conduct business on a limited basis, 38%

9 Research Report: The Shifting Cybersecurity Landscape 9 Figure 4. Changes in Cybersecurity Vendor Management Over the Last 12 Months How, if at all, has your organization s management of cybersecurity vendors changed over the last 12 months? (Percent of respondents, N=176, three responses accepted) For those who provide security as a service from the cloud we perform additional due diligence specific to their hosting environment 24% For those vendors we consider most strategic to our future cybersecurity initiatives, we require regular strategic product roadmap reviews to provide feedback and determine alignment with our technology roadmap 24% We have implemented a more thorough technical evaluation process to validate the functional claims made by cybersecurity vendors 23% We stay current on mergers and acquisitions made by our cybersecurity vendors and those made by their competitors 23% We feel we need to procure best of breed from a variety of security vendors and cannot apply stringent evaluations across a broader set of vendors 22% We track any issues the vendor themselves may have had with respect to breaches or the reverse engineering of their technology 19% We need to understand their internal security processes including software development practices, policies, compliance with applicable regulations 18% We have more regularly engaged with smaller, earlier stage cybersecurity companies who offer more innovative approaches and solutions 18% Recent security incidents have necessitated that we streamline the technical evaluation process to expedite the deployment of new controls to prevent future issues 18% With more startups involved in the cybersecurity ecosystem we feel it is important to review their financial viability before investing the time to consider purchasing and deploying their products 14% We track the financial performance of publicly traded companies 11% No change 14%

10 Research Report: The Shifting Cybersecurity Landscape 10 Vendor Consolidation Increases the Influence of the CISO Vendor consolidation may simplify activities like contract management and lead to more attractive discounts, but it also comes with some risk typically associated with relying on a single vendor (i.e., putting all of your proverbial eggs in one basket). To mitigate these risks, organizations will dedicate more effort toward vendor risk management by assessing each vendor s cyber supply chain, employee background checks, and technical support capabilities. Given the gravity of these risks, it is not surprising that 62% of cybersecurity professionals claim that their CISO is/will be more involved with vendors for activities like strategic briefings, including roadmap reviews and product/service procurement decisions (see Figure 5). With greater CISO involvement in product evaluation and selection, cybersecurity vendors must have the ability to communicate with and sell to CISOs if they hope to be viewed as enterprise-class. Selling to the CISO, however, will be challenging for security product and services vendors used to selling product feature/functionality directly to technologists rather than executives. To address changes in purchasing behavior, these vendors must hire executive level account managers or retrain direct sales and partners who can discuss cybersecurity issues in a business context. Figure 5. Impact of Cybersecurity Vendor Consolidation on Role of CISO What impact if any has your organization s cybersecurity vendor consolidation efforts had or do you expect them to have on the role of your CISO? (Percent of respondents, N=146) There has been/will be no change in how our CISO engages with cybersecurity vendors, 24% Our CISO will be less involved with vendors for strategic briefings including roadmap reviews and product/service procurement decisions, 14% Our CISO is/will be more involved with vendors for strategic briefings including roadmap reviews and product/service procurement decisions, 62%

11 Research Report: The Shifting Cybersecurity Landscape 11 The Concept of Cybersecurity Platforms Resonates, but Needs Further Refinement The aforementioned trends of product integration, vendor consolidation, and stringent vendor qualification collectively lend themselves to the concept of cybersecurity platforms as a means to realize these objectives. However, there exists a fundamental disconnect between vendors and customers/prospects when it comes to simply defining what a platform is. Fifty-five percent of respondents indicate that they either have not received enough detail from one or more vendors or they have not clearly understood platform offerings from any of their vendors (see Figure 6). This indicates that confusion persists, making cybersecurity platforms more hyperbole than reality. Contributing to the disconnect between customer and vendor definitions of a cybersecurity platform is likely the fact that both parties are in the early stages of considering what constitutes a platform or what is considered the most important requirements for a platform (see Figure 7). Thirty-eight percent of respondents believe that the most important attribute of a cybersecurity platform is a set of controls that span applications, hosts, and the network to coordinate threat prevention, detection, and response, while 22% of respondents cite that the most important attribute of a cybersecurity platform is an integrated product suite from a single vendor that also provides APIs for the integration of third-third party technologies. These requirements are certainly not mutually exclusive, but the differences in the most important attribute of a cybersecurity platform make it challenging for vendors to communicate the focus of their respective platforms. Refinement of this concept can be expected moving forward on an industry-wide basis, during which time this current confusion represents an opportunity for vendors to establish and cultivate thought leadership around their notion of a cybersecurity platform. For example, Vendor A may cater to the majority seeking applications, host, and network controls, while Vendor B specializes in customers seeking open source capabilities. The important consideration for vendors is to provide clarity on the focus and differentiations of their cybersecurity platform that align with market requirements and resonate with cybersecurity professionals.

12 Research Report: The Shifting Cybersecurity Landscape 12 Figure 6. Cybersecurity Platform Sentiment Which of the following statements most closely aligns with your opinion as to whether the cybersecurity industry has provided you and your organization a clear definition of a cybersecurity platform? (Percent of respondents, N=176) While some of our cybersecurity vendors have stated that they offer a platform, none have clearly conveyed what that means and why my organization should care, 11% Don t know/no opinion, 3% One or more cybersecurity vendors have conveyed a clear definition of their cybersecurity platform which we understand and with which we agree, 42% One or more cybersecurity vendors have provided a general definition of their cybersecurity platform, but more specifics would be helpful, 44% Figure 7. Most Important Attribute of a Cybersecurity Platform In your opinion, which of the following is the most important attribute of a cybersecurity platform? (Percent of respondents, N=176) A cybersecurity platform is an environment that allows me to integrate a variety of open sources security tools, 16% A cybersecurity platform is an integrated product suite from a single vendor that also provides APIs for the integrations of third-party technologies, 22% A cybersecurity platform is a set of cybersecurity controls that span applications, hosts, and the network to coordinate threat prevention, detection, and response, 38% A cybersecurity platform is an integrated product suite from a single vendor, 23%

13 Research Report: The Shifting Cybersecurity Landscape 13 Enterprise-class Cybersecurity Vendors Are Emerging Customer demand for integrated solutions, the desire to consolidate vendors, and other aforementioned trends point to an opportunity for a select group of enterprise-class cybersecurity vendors (i.e., vendors that can offer features like leading integrated products, central management, professional/managed services, etc.). The perceived points of value in procuring cybersecurity solutions from enterprise-class vendors include (see Figure 8): Continuous innovation. Nearly half (47%) of respondents see value in enterprise security vendors that have the resources to fund cybersecurity R&D and continually innovate to keep up with user requirements and the threat landscape. This may be a function of enterprise security vendors remaining active in M&A activity to purchase innovative startups, but the data suggests that users want a combination of innovation and an integrated architecture. Consolidated support. Interestingly, 43% of respondents see value in an enterprise security vendor s ability to provide problem resolution through a single support contact. Given the global cybersecurity skills shortage and the current security operations morass, it makes sense that CISOs want to simplify security operations wherever they can. Operational efficiencies. Similarly, 43% believe that enterprise security vendors can deliver value through operational efficiencies with security and IT operations teams. Since these two groups tend to collaborate on provisioning, configuration management, and incident response, a common enterprise security platform could lead to better coordination, communications, and workflows. Aside from the general value, survey respondents were asked to identify the most important attributes of an enterprise security vendor. These results were especially interesting (see Figure 9). The highest percentage (35%) say the most important attribute for an enterprise cybersecurity vendor is expertise specific to their industry. In other words, enterprise cybersecurity vendors must have knowledge and experience with industry business processes, specific technologies, and regulations. Nearly one-third (32%) of respondents chose three other important attributes: Offer cybersecurity products/services that align with IT initiatives. This means that enterprise cybersecurity vendors must have products and services that support projects like cloud computing, digital transformation, mobile applications, and IoT. Lead with a commitment to streamlining security operations and cutting costs. CISOs are overwhelmed today by factors like security alert volume and manual processes. Thus, they are looking for enterprise security vendors that can help them overcome these challenges and make operations more efficient, effective, and productive. Provide products built for integration, scale, and business processes. This equates to a broad portfolio of products, a commitment to scale and performance, and an architectural approach where multiple products act as force multipliers.

14 Research Report: The Shifting Cybersecurity Landscape 14 Figure 8. Value of Procuring Cybersecurity Solutions from Fewer Enterprise-class Vendors Which of the following best represents your organization s perspective on the value of procuring cybersecurity solutions from fewer enterprise-class cybersecurity companies? (Percent of respondents, N=176, multiple responses accepted) Well-resourced organizations can afford to fund research and development initiatives that yield a greater level of innovation to address the evolving threat landscape 47% Fast time to problem resolution via a single support contact 43% Operational efficiencies realized by our security and IT teams 43% Tighter integration between previously disparate security controls 37% Deep relationship in which the vendor better understands our business, computing environment, and strategic initiatives 34% Vendor management and procurement efficiencies 32% Because larger vendors are generally better resourced we see value on the potential to improve threat detection and prevention 31%

15 Research Report: The Shifting Cybersecurity Landscape 15 Figure 9. Most Important Attributes for Enterprise-class Cybersecurity Vendor In your view, which of the following attributes would you consider to be the most important for enterprise-class cybersecurity vendor? (Percent of respondents, N=176, three responses accepted) Cybersecurity expertise specific to my industry 35% Cybersecurity products and services portfolio which aligns with strategic IT initiatives Committed to reducing operational complexity lowering our cost of ownership Provides products designed for enterprise scale, integration, and business process requirements 32% 32% 32% Broad portfolio of both cybersecurity products and services 26% Focus on innovation High-touch, consultative field sales model including solution architects that help us get the most out of their technologies Extensive partner alliance program that yields meaningful integrations that allows me to leverage investments in other products Global presence and coverage 17% 16% 15% 15% Broad portfolio of cybersecurity services 14% Acquires innovative cybersecurity startups to fill gaps in their portfolio 12% Broad portfolio of cybersecurity products 11%

16 Research Report: The Shifting Cybersecurity Landscape 16 SIEM Is Important for Enterprise-class Security Consideration The role of security information and event management (SIEM) solutions has evolved from compliance use cases to incident response, security analytics, and threat hunting. For many organizations, their SIEM remains the center of the security operations center (SOC), receiving, aggregating, processing, and correlating logs and events from sensors across their environment. The central role of SIEM is reflected in the fact that nearly half of respondents (48%) report that SIEM is very important as part of an enterprise-class security architecture or platform, with an additional 45% reporting that SIEM is somewhat important as part of an enterprise-class security architecture or platform (see Figure 10). Given the overall importance of SIEM to many organizations overall cybersecurity operations, it is not surprising that IT professionals largely consider it important for an enterprise-class cybersecurity vendor to offer a SIEM product as part of its portfolio. In fact, an overwhelming 90% of respondents stated that it is either very important or important for a vendor to offer its own SIEM product in order to even be considered enterprise-class (see Figure 11). Vendors that do not offer a SIEM product will need to partner with SIEM leaders while conveying how they enable SIEM use cases with other solutions in their portfolio. Furthermore, it is important for vendors offering a SIEM to understand how cybersecurity professionals are using the technology. Respondents indicate that the capabilities they consider most important to an enterprise-class cybersecurity portfolio include threat intelligence integration (36%), which is often sourced from another vendor, and the centralization of security data collection (30%) (see Figure 12). ESG research participants also indicated that they look to their SIEM to enable a variety of important use cases including incident response automation for remediation tasks (26%) and integrated vulnerability scanning (23%). It is worth noting that these use cases can be part of a single product like SIEM or part of an overall security operations and analytics platform architecture (SOAPA). In other words, functions like threat intelligence integration could be performed on a dedicated threat intelligence platform (TIP), while incident response automation and orchestration could be delegated to an incident response platform (IRP) designed to track IR workflows throughout their lifecycles. Enterprise cybersecurity professionals demand this functionality and tight integration with SIEM. In this way, enterprise security vendors lacking a SIEM can partner with SIEM vendors and then effectively surround the SIEM with add-on capabilities through individual products and a comprehensive architecture.

17 Research Report: The Shifting Cybersecurity Landscape 17 Figure 10. Importance of SIEM as Part of Enterprise-class Security Architecture/Platform In your opinion, how important is a security information and event management (SIEM) system as part of an enterprise-class security architecture or platform? (Percent of respondents, N=176) Not very important, SIEM can be used to centralize some security analysis and operations tasks but this isn t especially attractive to my organization, 6% Somewhat important, SIEM can be used to centralize security analysis and operations in some instances but not in all cases, 45% Not at all important, my organization does not view SIEM as a means for centralizing security analysis and operations, 1% Very important, SIEM centralizes security analysis and operations across all other tools, 48% Figure 11. Importance of Enterprise-class Cybersecurity Vendor Offering SIEM Product In your opinion, how important is it for an enterprise-class cybersecurity vendor to offer a SIEM product? (Percent of respondents, N=176) It is not important for a cybersecurity vendor to offer their own SIEM product for us to consider them an enterprise-class vendor, 9% It is important for a cybersecurity vendor to offer their own SIEM product for us to consider them an enterpriseclass vendor, 41% Don t know/no opinion, 1% It is very important for a cybersecurity vendor to offer their own SIEM product for us to consider them an enterprise-class vendor, 49%

18 Research Report: The Shifting Cybersecurity Landscape 18 Figure 12. SIEM Capabilities Considered Most Important to Enterprise-class Cybersecurity Portfolio In your opinion, which of the following SIEM capabilities would you consider most important for an enterprise-class cybersecurity portfolio? (Percent of respondents, N=176, three responses accepted) Threat intelligence integration 36% Centralization of security data collection 30% Incident response automation for remediation tasks Advanced network monitoring Central dashboard used for security operations Integrated vulnerability scanning Regulatory compliance reporting Log analysis and event correlation Host monitoring Machine learning and other types of advanced algorithms for detecting cyber-attacks in progress Incident response workflow orchestration User behavior monitoring 26% 26% 25% 23% 21% 21% 19% 16% 15% 14%

19 Research Report: The Shifting Cybersecurity Landscape 19 Cisco, IBM, and Microsoft Are Most Commonly Perceived as Enterprise-class Security Vendors The concept of enterprise-class cybersecurity vendors is on the rise, but the vendor profiles remain somewhat ill-defined. However, when given a loose working definition of the term, ESG found that respondents most commonly consider Cisco (56%), IBM (44%), and Microsoft (40%) to be enterprise-class (see Figure 13). Other established cybersecurity vendors like Symantec and McAfee were not at the very top, but they did remain in the upper echelon of responses rounding out the top five. ESG believes it is noteworthy that Microsoft and Amazon, two vendors only peripherally involved in the cybersecurity technology market, occupy the third and sixth positions respectively. ESG attributes this to the strategic relationships these organizations have in IT infrastructure. Large organizations buy numerous products from Microsoft and invest a lot of time and effort into securing these products. Furthermore, Microsoft Active Directory remains a foundational component of enterprise security for user authentication, DHCP, and policy management. Amazon s presence on this list is directly related to continuing growth in enterprise use of AWS and other cloud services. Again, this means that security teams must have the proper training, controls, and oversight to mitigate risk and respond to incidents related to AWS. Figure 13. Respondents Rate Cybersecurity Vendors Please rate the following vendors regardless of whether or not your organization currently uses their products or services with respect to the breadth of their cybersecurity products and/or services designed for scale, integration, and to support business process requirements of a large organization. (Percent of respondents, N=176) Enterprise-class cybersecurity vendor Tactical provider of cybersecurity point tools and/or services Don t know enough about this vendor to have an opinion Cisco 56% 35% 10% IBM Security 44% 36% 19% Microsoft 40% 49% 11% Symantec (including Blue Coat) 36% 48% 15% McAfee (formerly Intel Security) 34% 53% 13% Amazon Web Services (AWS) 24% 50% 26% Dell SecureWorks 19% 56% 26% Palo Alto Networks 19% 52% 29% RSA Security 18% 59% 23% Check Point Software 15% 56% 28% Kaspersky 14% 62% 24% FireEye 10% 54% 36% Fortinet 9% 49% 42% Trend Micro 7% 63% 31% Forcepoint 7% 45% 48% Sophos 5% 56% 39% Imperva 5% 45% 50% Proofpoint 4% 52% 44% 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

20 Conclusion Research Report: The Shifting Cybersecurity Landscape 20 The well-known challenges of securing an expanding attack surface area against the ever-evolving threat landscape has necessitated the adoption of point tools. To combat multistage attacks with great efficiency, organizations are now actively building an architecture to enable the integration of disparate technologies, making integration a foundational product requirement. The fact that IT and security professionals stated they prefer to purchase security solutions from existing vendors and are actively consolidating their vendors indicates a preference to procure pre-integrated product suites based on platforms that also allow for the integration of best-of-breed tools. To meet these requirements, vendors are prescribing cybersecurity platforms, the definition of which is still a work in progress. As organizations become more dependent on a smaller number of vendors that can provide such platforms, the vendors will be more rigorously evaluated, which makes the role of the CISO even more prominent in vendor and product selections. Major IT brands Cisco, IBM, and Microsoft with strong cybersecurity product portfolios, along with pure-play cybersecurity vendors Symantec and McAfee, are perceived as offering the requisite level of functional breadth and integration and thus are best positioned to emerge as enterprise-class cybersecurity market leaders. All told, the dichotomy of having to purchase point tools tactically to close security gaps while taking steps toward a strategic architectural approach based on integrations and platforms represents a shift in the cybersecurity landscape. Research Implications for Cybersecurity Vendors Based on the findings of this research, ESG offers the following recommendations to cybersecurity vendors positioning their brand as an enterprise-class provider of cybersecurity products and services: Convey a clear definition of your platform. More than half of research participants indicated that platform definitions provided by cybersecurity vendors have not been clearly conveyed or need more specifics, representing an opportunity for vendors to establish thought leadership around the immutable attributes of a cybersecurity platform. Based on customer requirements of a cybersecurity platform, such a definition will be one that, at a high level, provides depth of threat detection, prevention, and response capabilities across the breadth of an organization s attack surface area. Enable integrations and best-of-breed controls. While participants indicated an intent to consolidate their vendor base and initiatives to define an architecture and requirement for a platform, it is also clear there will be continued demand for best-of-breed cybersecurity products. These seemingly conflicting findings should be rationalized and embraced via the delivery of platforms based on an open architecture that enables the integration of best-of-breed technologies. Engage in a strategic dialog with CISOs. CISOs at organizations consolidating vendors will be highly engaged with vendors on their product roadmap plans. To evolve from being perceived as a supplier to a trusted and strategic partner, vendors should establish a regular cadence of such conversations with CISOs to gain alignment and endorsement of the technical and business aspects of their products and services. Cite your SIEM as an essential element of your portfolio or fill the gap. Given the research finding that cybersecurity professionals view a SIEM as a product that is important for enterprise-class cybersecurity vendors to provide, the SIEM offering in a cybersecurity portfolio should be positioned as a core element of the platform. Enterprise-class cybersecurity vendors whose product portfolio does not include a SIEM will need to point to partnerships with SIEM vendors, consider acquiring a standalone SIEM vendor, and/or cite other functional capabilities to address the SIEM requirement. Tout industry-specific knowledge for vertical marketing. Vendors with expertise, knowledge of, and success in specific industry verticals should employ vertical market campaigns to leverage that domain knowledge to maximize penetration in those markets. Those vendors that have not yet developed a core competency in verticals they target, or intend to sell into, will need to make investments to better understand industry-specific

21 Research Report: The Shifting Cybersecurity Landscape 21 dynamics such as regulations, hire professionals from those industries and/or systems, and/or establish partnerships for credibility by proxy in those markets. Research Implications for Cybersecurity Professionals The learnings from this research also provides important insights for cybersecurity professionals at organizations with strategic initiatives to employ cybersecurity platforms from enterprise-class vendors including: Evaluate a vendor s ability to meet your enterprise-class requirements. While this research conducted by ESG revealed that capabilities such as threat intelligence integration, incident response automation, and more, are requirements of enterprise-class cybersecurity vendors, each organization will have its own set of requirements. As such, as part of consolidating vendors and establishing a cybersecurity architecture, companies should establish that set of requirements internally, and then evaluate whether vendors positioned as enterprise-class can meet those requirements today or have a credible roadmap to do so in an acceptable time frame. Vet the alignment of the definition of a cybersecurity platform. As more cybersecurity vendors position their solution as a platform, the functional abilities and thus definition of a platform will vary. Security professionals should work collaboratively internally to define what a cybersecurity platform is for them based on the use cases it would enable, and then vet alignment with enterprise-class vendors on that definition. Look for integrations with existing controls that enable use cases. To fully leverage investments in existing controls, and those that could be employed in the future, organizations evaluating offerings from enterprise-class vendors should look for meaningful levels of integrations based on an open architecture. Such integrations will go beyond simple event sharing to enable use cases such as coordinated and expedited threat detection, prevention, and remediation between network and endpoint security controls. Customers should also evaluate a vendor s commitment to maintain an open partnership program and architecture that will ensure integrations will be supported and further developed in the future. Require CISO involvement in roadmap reviews. Vendors positioned as enterprise-class will make their product management team and key executives available to meet with CISOs to share and discuss their strategic direction and product roadmap. Organizations should be sure their CISO is engaged in these discussions to provide a holistic, and thus strategic technical and business view of the organization s cybersecurity requirements.

22 Research Report: The Shifting Cybersecurity Landscape 22 Research Methodology To gather data for this report, ESG conducted a comprehensive online survey of IT/information security professionals responsible for/familiar with their organization s cybersecurity environment and strategy, and with purchase authority or influence for cybersecurity products and services in North America (United States and Canada) between October 3, 2016 and October 13, All respondents were provided an incentive to complete the survey in the form of cash awards and/or cash equivalents. After filtering out unqualified respondents, removing duplicate responses, and screening the remaining completed responses (on a number of criteria) for data integrity, we were left with a final total sample of 176 IT/information security professionals. Please see the Respondent Demographics section of this report for more information on these respondents. Note: Totals in figures and tables throughout this report may not add up to 100% due to rounding.

23 Research Report: The Shifting Cybersecurity Landscape 23 Respondent Demographics The data presented in this report is based on a survey of 176 qualified respondents. Figures detail the demographics of the respondent base. Respondents by Current Responsibility Respondents current responsibility in shown in Figure 14. Figure 14. Respondents by Role Which of the following best describes your current responsibility within your organization? Information security management, 3% (Percent of respondents, N=176) Information security staff, 7% Senior information security management (e.g., CISO, CSO, etc.), 4% IT staff, 11% Senior IT management (e.g., CIO, VP of IT, Director of IT, etc.), 49% IT management, 26% Respondents by Number of Employees The number of employees in respondents organizations is shown in Figure 15. Figure 15. Respondents by Number of Employees Worldwide How many total employees does your organization have worldwide? (Percent of respondents, N=176) 20,000 or more, 19% 500 to 999, 7% 1,000 to 2,499, 19% 10,000 to 19,999, 11% 5,000 to 9,999, 22% 2,500 to 4,999, 22%

24 Research Report: The Shifting Cybersecurity Landscape 24 Respondents by Industry Respondents were asked to identify their organization s primary industry. In total, ESG received completed, qualified respondents from individuals in 19 distinct vertical industries, plus an Other category. Respondents were then grouped into the broader categories shown in Figure 16. Figure 16. Respondents by Industry What is your organization s primary industry? (Percent of respondents, N=176) Communications & Media, 2% Business Services (accounting, consulting, legal, etc.), 6% Government (Federal/National, State/Local), 9% Other, 16% Financial (banking, securities, insurance), 22% Manufacturing, 22% Retail/Wholesale, 11% Health Care, 13% Respondents by Annual Revenue Respondent organizations annual revenue is shown in Figure 17. Figure 17. Respondents by Annual Revenue What is your organization s total annual revenue ($US)? (Percent of respondents, N=176) 26% 16% 20% 0% 2% 3% 5% 7% 9% 10% 2% Less than $25 million$50 million $100 $25 million to $ to $ million to million million $ million $250 million to $ million $500 million to $ million $1 billion to $4.999 billion $5 billion to $9.999 billion $10 billion to $ billion $20 billion or more Not applicable (e.g., public sector, non-profit)

25 All trademark names are property of their respective companies. Information contained in this publication has been obtained by sources The Enterprise Strategy Group (ESG) considers to be reliable but is not warranted by ESG. This publication may contain opinions of ESG, which are subject to change from time to time. This publication is copyrighted by The Enterprise Strategy Group, Inc. Any reproduction or redistribution of this publication, in whole or in part, whether in hard-copy format, electronically, or otherwise to persons not authorized to receive it, without the express consent of The Enterprise Strategy Group, Inc., is in violation of U.S. copyright law and will be subject to an action for civil damages and, if applicable, criminal prosecution. Should you have any questions, please contact ESG Client Relations at Enterprise Strategy Group is an IT analyst, research, validation, and strategy firm that provides actionable insight and intelligence to the global IT community by The Enterprise Strategy Group, Inc. All Rights Reserved. P

Abstract: Data Protection Cloud Strategies

Abstract: Data Protection Cloud Strategies Enterprise Strategy Group Getting to the bigger truth. Research Report Abstract: Data Protection Cloud Strategies Considerations for Organizations Seeking to Utilize Cloud Services as Part of Their Data

More information

Closing the Hybrid Cloud Security Gap with Cavirin

Closing the Hybrid Cloud Security Gap with Cavirin Enterprise Strategy Group Getting to the bigger truth. Solution Showcase Closing the Hybrid Cloud Security Gap with Cavirin Date: June 2018 Author: Doug Cahill, Senior Analyst Abstract: Most organizations

More information

ForeScout Extended Module for Splunk

ForeScout Extended Module for Splunk Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review ForeScout Extended Module for Splunk Date: May 2017 Author: Tony Palmer, Senior Lab Analyst Abstract This report provides a first look

More information

The Role of Converged and Hyper-converged Infrastructure in IT Transformation

The Role of Converged and Hyper-converged Infrastructure in IT Transformation Enterprise Strategy Group Getting to the bigger truth. ESG Research Insights Brief The Role of Converged and Hyper-converged Infrastructure in IT Transformation The Quantified Effects of Organizational

More information

PAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY

PAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY WHITEPAPER PAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY CONTENTS Executive Summary........................................ 3 The Cybersecurity and Business Risk Survey..........................

More information

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL

Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day

More information

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging

More information

Building a Threat Intelligence Program

Building a Threat Intelligence Program WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351

More information

An All-Source Approach to Threat Intelligence Using Recorded Future

An All-Source Approach to Threat Intelligence Using Recorded Future nn Enterprise Strategy Group Getting to the bigger truth. Solution Showcase An All-Source Approach to Threat Intelligence Using Recorded Future Date: March 2018 Author: Jon Oltsik, Senior Principal Analyst

More information

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018 V REPORT : HPE Hybrid IT for SMBs HPE addressing SMB and channel partner Hybrid IT demands October 2018 ANALYST ANURAG AGRAWAL Data You Can Rely On Analysis You Can Act Upon HPE addressing SMB and partner

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform Date: October, 2018 Author: Jack Poller, Sr. Analyst The Challenges Enterprise Strategy Group

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

Efficient Data Center Virtualization Requires All-flash Storage

Efficient Data Center Virtualization Requires All-flash Storage White Paper Efficient Data Center Virtualization Requires All-flash Storage By Scott Sinclair, Storage Analyst November 2015 This ESG White Paper was commissioned by Pure Storage and is distributed under

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight ESG Lab Review InterSystems Data Platform: A Unified, Efficient Data Platform for Fast Business Insight Date: April 218 Author: Kerry Dolan, Senior IT Validation Analyst Abstract Enterprise Strategy Group

More information

Mastering The Endpoint

Mastering The Endpoint Organizations Find Value In Integrated Suites GET STARTED Overview In the face of constantly evolving threat vectors, IT security decision makers struggle to manage endpoint security effectively. More

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

OVERVIEW BROCHURE GRC. When you have to be right

OVERVIEW BROCHURE GRC. When you have to be right OVERVIEW BROCHURE GRC When you have to be right WoltersKluwerFS.com In response to today s demanding economic and regulatory climate, many financial services firms are transforming operations to enhance

More information

Enabling IT Transformation with Modern Data Protection Strategies

Enabling IT Transformation with Modern Data Protection Strategies Enterprise Strategy Group Getting to the bigger truth. ESG Research Insights Brief Enabling IT Transformation with Modern Data Protection Strategies The Quantified Benefits of a Comprehensive Data Protection

More information

SELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats

SELLING YOUR ORGANIZATION ON APPLICATION SECURITY. Navigating a new era of cyberthreats SELLING YOUR ORGANIZATION ON APPLICATION SECURITY Navigating a new era of cyberthreats Selling Your Organization on Application Security 01 It's no secret that cyberattacks place organizations large and

More information

Cloud Migration Strategies

Cloud Migration Strategies Enterprise Strategy Group Getting to the bigger truth. Research Insights Paper Cloud Migration Strategies Mapping the Journey to Successful Cloud Adoption By Dan Conde, ESG Analyst; and Leah Matuson, Research

More information

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report. 2019 SIEM REPORT INTRODUCTION Security Information and Event Management (SIEM) is a powerful technology that allows security operations teams to collect, correlate and analyze log data from a variety of

More information

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER HOW TO ADDRESS GARTNER S FIVE CHARACTERISTICS OF AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER 1 POWERING ACTIONABLE

More information

Hyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale

Hyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale Enterprise Strategy Group Getting to the bigger truth. White Paper Hyperconverged Infrastructure: Cost-effectively Simplifying IT to Improve Business Agility at Scale By Mike Leone, ESG Senior Analyst;

More information

Veritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid

Veritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid Enterprise Strategy Group Getting to the bigger truth. SOLUTION SHOWCASE Veritas Resiliency Platform: The Moniker Is New, but the Pedigree Is Solid Date: September 2015 Authors: Jason Buffington, Senior

More information

Enabling Hybrid Cloud Transformation

Enabling Hybrid Cloud Transformation Enterprise Strategy Group Getting to the bigger truth. White Paper Enabling Hybrid Cloud Transformation By Scott Sinclair, ESG Senior Analyst November 2018 This ESG White Paper was commissioned by Primary

More information

CYBERSECURITY AND THE MIDDLE MARKET

CYBERSECURITY AND THE MIDDLE MARKET CYBERSECURITY AND THE MIDDLE MARKET The Importance of Cybersecurity and How Middle Market Companies Manage Cyber Risks IN COLLABORATION WITH 2 Concerns about cybersecurity are not matched by plans. IMPORTANCE

More information

VMAX3: Adaptable Enterprise Resiliency

VMAX3: Adaptable Enterprise Resiliency ESG Solution Showcase VMAX3: Adaptable Enterprise Resiliency Date: August 2015 Author: Scott Sinclair, Analyst Abstract: As enterprises respond to the ever- present reality of rapid data growth, IT organizations

More information

Traditional Security Solutions Have Reached Their Limit

Traditional Security Solutions Have Reached Their Limit Traditional Security Solutions Have Reached Their Limit CHALLENGE #1 They are reactive They force you to deal only with symptoms, rather than root causes. CHALLENGE #2 256 DAYS TO IDENTIFY A BREACH TRADITIONAL

More information

Run the business. Not the risks.

Run the business. Not the risks. Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.

More information

Services solutions for Managed Service Providers (MSPs)

Services solutions for Managed Service Providers (MSPs) McAfee Advanced Threat Defense Services solutions for Managed Service Providers (MSPs) Differentiate your services and protect customers against zero-day attacks with the industry s most comprehensive

More information

The State of Cybersecurity and Digital Trust 2016

The State of Cybersecurity and Digital Trust 2016 The State of Cybersecurity and Digital Trust 2016 Identifying Cybersecurity Gaps to Rethink State of the Art Executive Summary Executive Summary While the advent of digital technology has fueled new business

More information

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:

More information

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill

More information

Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure

Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure Hybrid WAN Operations: Extend Network Monitoring Across SD-WAN and Legacy WAN Infrastructure An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for SevOne May 2017 IT & DATA MANAGEMENT RESEARCH,

More information

Oracle Buys Automated Applications Controls Leader LogicalApps

Oracle Buys Automated Applications Controls Leader LogicalApps Oracle Buys Automated Applications Controls Leader LogicalApps To strengthen Oracle s Governance, Risk and Compliance Suite with Real-time Policy Enforcement October 26, 2007 Disclaimer The following is

More information

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY Perspectives from U.S. and ese IT Professionals Executive Summary The use of artificial intelligence (AI) and machine learning (ML) in cybersecurity

More information

M&A Cyber Security Due Diligence

M&A Cyber Security Due Diligence M&A Cyber Security Due Diligence Prepared by: Robert Horton, Ollie Whitehouse & Sherief Hammad Contents Page 1 Introduction 3 2 Technical due diligence goals 3 3 Enabling the business through cyber security

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

Three Key Challenges Facing ISPs and Their Enterprise Clients

Three Key Challenges Facing ISPs and Their Enterprise Clients Three Key Challenges Facing ISPs and Their Enterprise Clients GRC, enterprise services, and ever-evolving hybrid infrastructures are all dynamic and significant challenges to the ISP s enterprise clients.

More information

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing

More information

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 www.pwc.com RIMS Perk Session 2015 - Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 Los Angeles RIMS Agenda Introductions What is Cybersecurity? Crown jewels The bad

More information

SOLUTION BRIEF Virtual CISO

SOLUTION BRIEF Virtual CISO SOLUTION BRIEF Virtual CISO programs that prepare you for tomorrow s threats today Organizations often find themselves in a vise between ever-evolving cyber threats and regulatory requirements that tighten

More information

IDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment

IDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment IDC MarketScape IDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment Chad Huston Ali Zaidi THIS IDC MARKETSCAPE EXCERPT FEATURES: WIPRO IDC

More information

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted) ESG Lab Review Sophos Security Heartbeat Date: January 2016 Author: Tony Palmer, Sr. ESG Lab Analyst; and Jack Poller, ESG Lab Analyst Abstract: This report examines the key attributes of Sophos synchronized

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

FOR FINANCIAL SERVICES ORGANIZATIONS

FOR FINANCIAL SERVICES ORGANIZATIONS RSA BUSINESS-DRIVEN SECURITYTM FOR FINANCIAL SERVICES ORGANIZATIONS MANAGING THE NEXUS OF RISK & SECURITY A CHANGING LANDSCAPE AND A NEW APPROACH Today s financial services technology landscape is increasingly

More information

Optimisation drives digital transformation

Optimisation drives digital transformation January 2017 Executive summary Forward-thinking business leaders are challenging their organisations to achieve transformation by harnessing digital technologies with organisational, operational, and business

More information

ESG Research. Executive Summary. By Jon Oltsik, Senior Principal Analyst, and Colm Keegan, Senior Analyst

ESG Research. Executive Summary. By Jon Oltsik, Senior Principal Analyst, and Colm Keegan, Senior Analyst ESG Research Executive Summary The Expanding Role and Importance of Application Delivery Controllers (ADCs) By Jon Oltsik, Senior Principal Analyst, and Colm Keegan, Senior Analyst February 2015 This ESG

More information

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and

More information

IDC MarketScape: Worldwide Cloud Professional Services 2018 Vendor Assessment

IDC MarketScape: Worldwide Cloud Professional Services 2018 Vendor Assessment IDC MarketScape IDC MarketScape: Worldwide Cloud Professional Services 2018 Vendor Assessment Gard Little Chad Huston THIS IDC MARKETSCAPE EXCERPT FEATURES DELL EMC IDC MARKETSCAPE FIGURE FIGURE 1 IDC

More information

2013 North American Software Defined Data Center Management Platforms New Product Innovation Award

2013 North American Software Defined Data Center Management Platforms New Product Innovation Award 2013 North American Software Defined Data Center Management Platforms New Product Innovation Award 2013 New Product Innovation Award Software Defined Data Center Management Platforms North America, 2013

More information

DATACENTER SERVICES DATACENTER

DATACENTER SERVICES DATACENTER SERVICES SOLUTION SUMMARY ALL CHANGE React, grow and innovate faster with Computacenter s agile infrastructure services Customers expect an always-on, superfast response. Businesses need to release new

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Cloud Computing January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Purpose and Methodology Survey Sample Field Work December 20, 2011 January 9, 2012 Total Respondents 554 Margin of Error +/- 4.2%

More information

Hearing Voices: The Cybersecurity Pro s View of the Profession

Hearing Voices: The Cybersecurity Pro s View of the Profession SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International

More information

THE POWER OF TECH-SAVVY BOARDS:

THE POWER OF TECH-SAVVY BOARDS: THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES

More information

SDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS

SDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS January 2018 Sponsored by Introduction 302 network professionals and IT strategists completed a global survey on Software Defined Networks (SDNs) to gather hard data on SDN adoption and operational challenges.

More information

The Journey to Intent-based Networking

The Journey to Intent-based Networking Enterprise Strategy Group Getting to the bigger truth. White Paper The Journey to Intent-based Networking Ten Key Principles for Accelerating Adoption By Bob Laliberte, ESG Senior Analyst January 2018

More information

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions

More information

Cloud Strategies for Addressing IT Challenges

Cloud Strategies for Addressing IT Challenges Cloud Strategies for Addressing IT Challenges Mark Bowker Senior Analyst Enterprise Strategy Group Introduction Mark Bowker, Senior Analyst U.S. Headquarters 20 Asylum Street Milford, MA 01757 2011 Enterprise

More information

IDC MarketScape: Worldwide Network Consulting Services 2017 Vendor Assessment

IDC MarketScape: Worldwide Network Consulting Services 2017 Vendor Assessment IDC MarketScape IDC MarketScape: Worldwide Network Consulting Services 2017 Vendor Assessment Leslie Rosenberg THIS IDC MARKETSCAPE EXCERPT FEATURES: CISCO IDC MARKETSCAPE FIGURE FIGURE 1 IDC MarketScape

More information

GDPR: An Opportunity to Transform Your Security Operations

GDPR: An Opportunity to Transform Your Security Operations GDPR: An Opportunity to Transform Your Security Operations McAfee SIEM solutions improve breach detection and response Is your security operations GDPR ready? General Data Protection Regulation (GDPR)

More information

Dell EMC Hyperconverged Portfolio: Solutions that Cover the Use Case Spectrum

Dell EMC Hyperconverged Portfolio: Solutions that Cover the Use Case Spectrum Enterprise Strategy Group Getting to the bigger truth. White Paper Dell EMC Hyperconverged Portfolio: Solutions that Cover the Use Case Spectrum Broad Portfolio that Meets the Wide Variety of Customer

More information

Cylance Axiom Alliances Program

Cylance Axiom Alliances Program Alliances Program Cylance Axiom Alliances Program Program Overview The Cylance Axiom Alliances Program is a community of cybersecurity solution providers working together to deliver a prevention-first

More information

Abstract. The Challenges. ESG Lab Review Lumeta Spectre: Cyber Situational Awareness

Abstract. The Challenges. ESG Lab Review Lumeta Spectre: Cyber Situational Awareness ESG Lab Review Lumeta Spectre: Cyber Situational Awareness Date: September 2017 Author: Tony Palmer, Senior IT Validation Analyst Enterprise Strategy Group Getting to the bigger truth. Abstract ESG Lab

More information

Automation and Analytics versus the Chaos of Cybersecurity Operations

Automation and Analytics versus the Chaos of Cybersecurity Operations Enterprise Strategy Group Getting to the bigger truth. ESG Research Insights Paper Automation and Analytics versus the Chaos of Cybersecurity Operations By Jon Oltsik, ESG Senior Principal Analyst; and

More information

Research Insights Paper

Research Insights Paper Research Insights Paper Status Quo Creates Security Risk: The State of Incident Response By Jon Oltsik, Senior Principal Analyst February 2016 This ESG Research Insights Paper was commissioned by ServiceNow

More information

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported

More information

Endpoint Security Must Include Rapid Query and Remediation Capabilities

Endpoint Security Must Include Rapid Query and Remediation Capabilities Enterprise Strategy Group Getting to the bigger truth. White Paper: Endpoint Security Must Include Rapid Query and Remediation Capabilities 1 White Paper Endpoint Security Must Include Rapid Query and

More information

Symantec Data Center Transformation

Symantec Data Center Transformation Symantec Data Center Transformation A holistic framework for IT evolution As enterprises become increasingly dependent on information technology, the complexity, cost, and performance of IT environments

More information

2018 Trends in Hosting & Cloud Managed Services

2018 Trends in Hosting & Cloud Managed Services PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

Abstract. The Challenges. ESG Lab Review Proofpoint Advanced Threat Protection. Figure 1. Top Ten IT Skills Shortages for 2016

Abstract. The Challenges. ESG Lab Review Proofpoint Advanced Threat Protection. Figure 1. Top Ten IT Skills Shortages for 2016 ESG Lab Review Proofpoint Advanced Threat Protection Enterprise Strategy Group Getting to the bigger truth. Date: January 2017 Author: Tony Palmer, Senior Lab Analyst; and Jack Poller, Senior Lab Analyst

More information

MITIGATE CYBER ATTACK RISK

MITIGATE CYBER ATTACK RISK SOLUTION BRIEF MITIGATE CYBER ATTACK RISK CONNECTING SECURITY, RISK MANAGEMENT & BUSINESS TEAMS TO MINIMIZE THE WIDESPREAD IMPACT OF A CYBER ATTACK DIGITAL TRANSFORMATION CREATES NEW RISKS As organizations

More information

in Action Delivering the digital enterprise Human Centric Innovation Ralf Salzmann Manager OEM

in Action Delivering the digital enterprise Human Centric Innovation Ralf Salzmann Manager OEM Delivering the digital enterprise The five stages of infrastructure evolution Ralf Salzmann Human Centric Innovation in Action Manager OEM Sales @Brocade Agenda BRCD Company details What does digital mean

More information

NEXT GENERATION SECURITY OPERATIONS CENTER

NEXT GENERATION SECURITY OPERATIONS CENTER DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

User Survey Analysis: Next Steps for Server Virtualization in the Midmarket

User Survey Analysis: Next Steps for Server Virtualization in the Midmarket User Survey Analysis: Next Steps for Server Virtualization in the Midmarket Gartner RAS Core Research Note G00207375, James A. Browning, Alan Dayley, 21 October 2010, RV2A411012011 Approximately 30% of

More information

MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services

MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services MATURE YOUR CYBER DEFENSE OPERATIONS with Accenture s SIEM Transformation Services THE NEED FOR MATURE CYBER DEFENSE CAPABILITIES The average annual cost of cyber crime reached $11.7 million per organization

More information

Cyber Security in Smart Commercial Buildings 2017 to 2021

Cyber Security in Smart Commercial Buildings 2017 to 2021 Smart Buildings Cyber Security in Smart Commercial Buildings 2017 to 2021 Published: Q2 2017 Cyber Security in Smart Buildings Synopsis 2017 This report will help all stakeholders and investors in the

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Think Cloud Compliance Case Study Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Customer details : Collector Bank - Sweden 329 employees www.collector.se/en Banking

More information

Securing Your Digital Transformation

Securing Your Digital Transformation Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,

More information

Reference Research: Disk-based Storage Capacity Trends Date: September 2012 Author: Bill Lundell, Senior Research Analyst

Reference Research: Disk-based Storage Capacity Trends Date: September 2012 Author: Bill Lundell, Senior Research Analyst Research Brief Reference Research: Disk-based Storage Capacity Trends Date: September 2012 Author: Bill Lundell, Senior Research Analyst Abstract: ESG Reference Research includes data-centric reports and

More information

Six Sigma in the datacenter drives a zero-defects culture

Six Sigma in the datacenter drives a zero-defects culture Six Sigma in the datacenter drives a zero-defects culture Situation Like many IT organizations, Microsoft IT wants to keep its global infrastructure available at all times. Scope, scale, and an environment

More information

THE CYBERSECURITY LITERACY CONFIDENCE GAP

THE CYBERSECURITY LITERACY CONFIDENCE GAP CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks

More information

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS Introduction The world of cybersecurity is changing. As all aspects of our lives become increasingly connected, businesses have made

More information

GDPR COMPLIANCE REPORT

GDPR COMPLIANCE REPORT 2018 GDPR COMPLIANCE REPORT INTRODUCTION Effective as of May 25, 2018, the European Union General Data Protection Regulation (GDPR) represents the most sweeping change in data privacy regulation in decades.

More information

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE SESSION ID: SBX4W5 SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE Dara Such VP & Publisher, Security Networking and IoT TechTarget @darasuch What we ll cover today State of SecOps:

More information

White Paper. How to Write an MSSP RFP

White Paper. How to Write an MSSP RFP White Paper How to Write an MSSP RFP https://www.solutionary.com (866) 333-2133 Contents 3 Introduction 3 Why a Managed Security Services Provider? 5 Major Items to Consider Before Writing an RFP 5 Current

More information

I D C T E C H N O L O G Y S P O T L I G H T

I D C T E C H N O L O G Y S P O T L I G H T I D C T E C H N O L O G Y S P O T L I G H T P ow e ring Digital Transfor m a t i o n T h r ough the C l o u d - R e a d y E n t e r p rise September 2016 Adapted from Developing a Cloud Strategy for Digital

More information

Modern Database Architectures Demand Modern Data Security Measures

Modern Database Architectures Demand Modern Data Security Measures Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing

More information

Continuous protection to reduce risk and maintain production availability

Continuous protection to reduce risk and maintain production availability Industry Services Continuous protection to reduce risk and maintain production availability Managed Security Service Answers for industry. Managing your industrial cyber security risk requires world-leading

More information

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response Security Operations Flexible and Scalable Solutions to Improve Your Security Capabilities Security threats continue to rise each year and are increasing in sophistication and malicious intent. Unfortunately,

More information

CICS insights from IT professionals revealed

CICS insights from IT professionals revealed CICS insights from IT professionals revealed A CICS survey analysis report from: IBM, CICS, and z/os are registered trademarks of International Business Machines Corporation in the United States, other

More information

THE STATE OF IT TRANSFORMATION FOR RETAIL

THE STATE OF IT TRANSFORMATION FOR RETAIL THE STATE OF IT TRANSFORMATION FOR RETAIL An Analysis by Dell EMC and VMware Dell EMC and VMware are helping IT groups at retail organizations transform to business-focused service providers. The State

More information

STATE OF STORAGE IN VIRTUALIZED ENVIRONMENTS INSIGHTS FROM THE MIDMARKET

STATE OF STORAGE IN VIRTUALIZED ENVIRONMENTS INSIGHTS FROM THE MIDMARKET STATE OF STORAGE IN VIRTUALIZED ENVIRONMENTS INSIGHTS FROM THE MIDMARKET PAGE 1 ORGANIZATIONS THAT MAKE A GREATER COMMITMENT TO VIRTUALIZING THEIR OPERATIONS GAIN GREATER EFFICIENCIES. PAGE 2 SURVEY TOPLINE

More information